File tree Expand file tree Collapse file tree 4 files changed +36
-0
lines changed Expand file tree Collapse file tree 4 files changed +36
-0
lines changed Original file line number Diff line number Diff line change @@ -61,7 +61,16 @@ A common workflow is to yank a crate having already published a semver
61
61
compatible version, to reduce the probability of preventing dependent
62
62
crates from compiling.
63
63
64
+ To address copyright, licensing, or personal data issues with your published
65
+ crate, contact the maintainers of the registry you used. For crates.io, refer
66
+ to their [ policies] and contact them at < help@crates.io > .
67
+
68
+ If your credentials have been leaked, the recommended process is to revoke them
69
+ immediately. Once a crate is published, it's impossible to know if those leaked
70
+ credentials have been copied, so taking swift action is crucial.
71
+
64
72
[ RustSec ] : https://rustsec.org/
73
+ [ policies ] : https://crates.io/policies
65
74
66
75
## OPTIONS
67
76
Original file line number Diff line number Diff line change @@ -66,6 +66,16 @@ DESCRIPTION
66
66
compatible version, to reduce the probability of preventing dependent
67
67
crates from compiling.
68
68
69
+ To address copyright, licensing, or personal data issues with your
70
+ published crate, contact the maintainers of the registry you used. For
71
+ crates.io, refer to their policies <https://crates.io/policies> and
72
+ contact them at <help@crates.io>.
73
+
74
+ If your credentials have been leaked, the recommended process is to
75
+ revoke them immediately. Once a crate is published, it’s impossible to
76
+ know if those leaked credentials have been copied, so taking swift
77
+ action is crucial.
78
+
69
79
OPTIONS
70
80
Yank Options
71
81
--vers version, --version version
Original file line number Diff line number Diff line change @@ -61,7 +61,16 @@ A common workflow is to yank a crate having already published a semver
61
61
compatible version, to reduce the probability of preventing dependent
62
62
crates from compiling.
63
63
64
+ To address copyright, licensing, or personal data issues with your published
65
+ crate, contact the maintainers of the registry you used. For crates.io, refer
66
+ to their [ policies] and contact them at < help@crates.io > .
67
+
68
+ If your credentials have been leaked, the recommended process is to revoke them
69
+ immediately. Once a crate is published, it's impossible to know if those leaked
70
+ credentials have been copied, so taking swift action is crucial.
71
+
64
72
[ RustSec ] : https://rustsec.org/
73
+ [ policies ] : https://crates.io/policies
65
74
66
75
## OPTIONS
67
76
Original file line number Diff line number Diff line change @@ -91,6 +91,14 @@ irrespective of susceptibility to the vulnerability in question.
91
91
A common workflow is to yank a crate having already published a semver
92
92
compatible version, to reduce the probability of preventing dependent
93
93
crates from compiling.
94
+ .sp
95
+ To address copyright, licensing, or personal data issues with your published
96
+ crate, contact the maintainers of the registry you used. For crates.io, refer
97
+ to their \fI policies \fR <https://crates.io/policies> and contact them at <help@crates.io>\& .
98
+ .sp
99
+ If your credentials have been leaked, the recommended process is to revoke them
100
+ immediately. Once a crate is published, it\[cq ] s impossible to know if those leaked
101
+ credentials have been copied, so taking swift action is crucial.
94
102
.SH "OPTIONS"
95
103
.SS "Yank Options"
96
104
.sp
You can’t perform that action at this time.
0 commit comments